[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-Disclosure] Disabling Cached Logon Credentials
- To: focus-ms@securityfocus.com, full-disclosure@lists.netsys.com
- Subject: [Full-Disclosure] Disabling Cached Logon Credentials
- From: <dwr3ck@hushmail.com>
- Date: Tue, 30 Dec 2003 10:28:34 -0800
Disabling cached logon credentials is on virtually every server hardening
checklist.
If you have your servers physically secured in a data center what is
the real benefit of disabling cached logon credentials?
Whenever a server is off the network, admins have to obtain the local
admin password. Depending on how you handle local RID=500 account passwords
this can add significantly to downtime when resolving issues.
Does anyone know of a way to exploit cached credentials over the wire?
If someone has physical access to a system they own it anyway:
http://home.eunet.no/~pnordahl/ntpasswd/
Concerned about your privacy? Follow this link to get
FREE encrypted email: https://www.hushmail.com/?l=2
Free, ultra-private instant messaging with Hush Messenger
https://www.hushmail.com/services.php?subloc=messenger&l=434
Promote security and make money with the Hushmail Affiliate Program:
https://www.hushmail.com/about.php?subloc=affiliate&l=427
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html